Connecting...Academia & Industry

Switching, Routing, and Wireless Essentials

Network Infrastructure

The course in a 3-course CCNA series designed to prepare you for networking technician job.

Delve Further Into the World of Networking

This course focuses on switching technologies and router operations that support small-to-medium business networks, including wireless local area networks (WLAN) and security concepts. In this course you’ll perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. Recommended preparation: CCNA: Introduction to Networks or having equivalent knowledge. After completing all three CCNA courses, you are ready to take the CCNA Certification.

You’ll Learn These Core Skills:

  • Work with routers, switches and wireless devices to configure and troubleshoot VLANs, Wireless LANs and Inter-VLAN routing.
  • Configure and troubleshoot redundancy on a switched network using STP and EtherChannel.
  • Develop critical thinking and problem-solving skills using real equipment and Cisco Packet Tracer.
  • Explain how to support available and reliable networks using dynamic addressing and first-hop redundancy protocols.

Related Courses

Office Cloud
Professional Certification

Microsoft 365 Administrator

Become a Certified Microsoft 365 Administrator: Take charge of your organization’s productivity and security with our comprehensive Microsoft 365 Administrator certification course. Learn to deploy, manage, and secure Microsoft 365 services including Exchange Online, SharePoint Online, Teams, and more. Gain expertise in user management, data governance, compliance, and troubleshooting to maximize the efficiency and security of your Microsoft 365 environment. Ideal for IT professionals seeking to become proficient administrators of Microsoft 365. Start your journey to mastering Microsoft 365 administration today!

Azure Cloud
Professional Certification

Deploy and Configure Azure Monitor

Master Deploying and Configuring Azure Monitor: Elevate your cloud management capabilities with our in-depth course on deploying and configuring Azure Monitor. Learn to set up and utilize Azure Monitor for comprehensive insights into your cloud infrastructure. Gain expertise in configuring alerts, analyzing metrics, and optimizing performance and security using Azure’s powerful monitoring tools. Ideal for IT professionals and Azure administrators aiming to enhance their monitoring and operational efficiency in the cloud. Start your journey to mastering Azure Monitor deployment and configuration today!

Hacking Forensic
Professional Certification

Computer Hacking Forensic Investigator (CHFI)

Become a Certified Hacking Forensic Investigator: Master the art of digital forensics with our Hacking Forensic certification course. Learn to uncover digital evidence, analyze cyber incidents, and investigate hacking activities. Gain expertise in forensic tools, techniques, and methodologies to solve cybercrimes and secure systems. Ideal for IT professionals and cybersecurity enthusiasts aiming to specialize in digital forensics and cyber investigation. Start your journey to becoming a hacking forensic expert today!

User Security
Professional Certification

Certified Secure Computer User (CSCU)

Become a Certified Secure Computer User: Safeguard your digital life with our Secure Computer User certification course. Learn essential skills to protect your personal and professional data from cyber threats, including malware, phishing, and social engineering attacks. Gain knowledge in safe internet practices, email security, and data protection. Ideal for individuals and employees seeking to enhance their cybersecurity awareness and stay safe online. Start your journey to becoming a secure computer user today!

Professional Certification

Certified Ethical Hacker (CEH)

Become a Certified Ethical Hacker: Dive into the world of cybersecurity with our Ethical Hacking certification course. Learn to identify vulnerabilities, conduct penetration testing, and secure systems against cyber threats. Master tools and techniques used by ethical hackers to protect networks, applications, and data. Ideal for IT professionals and security enthusiasts aiming to safeguard organizations from malicious attacks. Start your journey to becoming an ethical hacking expert today!

Scroll to Top